Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

itwbennett writes Two former U.S. government agents face charges related to stealing hundreds of thousands of dollars worth of bitcoin while assisting with an investigation of the Silk Road underground online marketplace, with one accused of using a fake online persona to extort money from operators of the site. Facing charges of wire fraud and money laundering are Carl Force, 46, of Baltimore, a former special agent with the U.S. Drug Enforcement Agency, and Shaun Bridges, 32, of Laurel, Maryland, a former special agent with the U.S. Secret Service. Both served on the Baltimore Silk Road Task Force, which investigated illegal activity on the Silk Road website, the Department of Justice said Monday in a press release.

benrothke writes Technology is neutral and amoral. It's the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit society, and how it can also be exploited by those on the other side. Keep reading for the rest of Ben's review.

seven of five writes One man is dead and another severely injured after a shootout at one of the main gates of the National Security Agency located at Fort Meade, Maryland. Two men dressed as women attempted to 'penetrate' the entry point with their vehicle when a shootout occurred, officials said. The FBI said they do not believe the incident is related to terrorism.

Bruce66423 writes: A fraudster used a mobile phone while inside a UK prison to email the prison a notice for him to be released. The prison staff then released him. The domain was registered in the name of the police officer investigating him, and its address was the court building. The inmate was in prison for fraud — he was originally convicted after calling several banks and getting them to send him upwards of £1.8 million.

rHBa writes The BBC reports that the UK mapping organization Ordnance Survey has added 4 new products to its open data portfolio: OS Local, Names, Rivers and Roads. Perhaps the most interesting of the free data sets is OS Local which provides a base map to identify "hotspots" such as property pricing, insurance risk, and crime. The OS are not creating a new Google Maps-style service of their own but rather are providing their data for use by other third-party apps and online tools. They expect developers and designers to use the data to enhance their own products and improve the information people can access via the web.

jfruh writes PayPal may not be a bank, but it's still legally required to follow regulations on transferring money — but the company has admitted to a number of violations, including allowing transfers to an individual specifically sanctioned by the U.S. State Department for helping proliferate nuclear weapons. From Ars: "On Wednesday afternoon, PayPal reached a settlement with the US Treasury Department, agreeing that it would pay $7.7 million for allegedly processing payments to people in countries under sanction as well as to a man the US has listed as involved in the nuclear weapons black market. The company neither confirmed nor denied the allegations, but it voluntarily handed over its transaction data to the US Department of Treasury’s Office of Foreign Assets Control (OFAC)."

An anonymous reader sends news that unidentified hackers are
demanding 500 bitcoins, currently worth about $128,000, from administrators of a New Jersey school district. Four elementary schools in Swedesboro-Woolwich School District, which enroll more than 1,700 students, are now locked out of certain tasks: "Without working computers, teachers cannot take attendance, access phone numbers or records, and students cannot purchase food in cafeterias. Also, [district superintendent Dr. Terry C. Van Zoeren] explained, parents cannot receive emails with students grades and other information." According to this blog post from security company BatBlue, the district has been forced to postpone the Common Core-mandated PARCC state exams, too. Small comfort: "Fortunately the Superintendent told CBS 3’s Walt Hunter the hackers, using a program called Ransomware, did not access any personal information about students, families or teachers." Perhaps the administrators can take heart: Ransomware makers are, apparently, starting to focus more on product support; payment plans are probably on the way.

HughPickens.com writes Nick Wingfield reports at the NYT that practical jokers who call in bogus reports of violence provoking huge police responses have set their sights on a new set of victims: video gamers who play live on the Internet, often in front of huge online audiences. Last month, several hundred people were watching Joshua Peters as he played RuneScape from his parents' home as video showed Peters suddenly leaving his computer when police officers appeared at the house and ordered him and his family at gunpoint to lie face down on the ground after some had called 911 claiming Peters had just shot his roommate. "With the live-streaming platforms, it amplifies the entire situation," says James Clayton Eubanks who says he has been swatted about a half-dozen times while he streamed his Call of Duty sessions. "Not only do they get to do this and cause this misery, they get to watch it unfold in front of thousands of people."

Game companies like Twitch have publicly said that swatting is dangerous, but that there is little else they can do to prevent the pranks. Tracking the culprits behind the pranks is difficult. While bomb scares and other hoaxes have been around for decades, making threats anonymously has never been so easy. Swatters use text messages and online phone services like Skype to relay their threats, employing techniques to make themselves hard to trace. They obtain personal addresses for their victims through property records and other public databases, or by tricking businesses or customer service representatives at a victim's Internet provider into revealing the information. Brandon Willson, a gamer known online as "Famed God," made up a murder to get police to go to an unsuspecting west suburban resident's home last year and ended up behind bars in Nevada awaiting extradition. As part of the investigation, police traveled to Las Vegas to help local police execute a search warrant at Willson's home. Computers seized there contained evidence of the swatting incident, as well as similar incidents across the country, prosecutors claim. Willson faces up to five years in prison if he is convicted on charges of computer tampering and one count each of intimidation, computer fraud, identity theft and disorderly conduct. His mother, Brenda Willson, says her son is innocent and does not smoke, drink or have tattoos. "He would never swat," she says.

An anonymous reader writes Recently, Techdirt noted that the FBI may soon have permission to break into computers anywhere on the planet. It will come as no surprise to learn that the U.S.'s partner in crime, the UK, granted similar powers to its own intelligence services some time back. What's more unexpected is that it has now publicly said as much, as Privacy International explains: "The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime." That important admission was made in what the UK government calls its "Open Response" to court cases started last year against GCHQ.

jones_supa writes: Hardware that sports the "Designed for Windows 8" logo requires machines to support UEFI Secure Boot. When the feature is enabled, the core software components used to boot the machine are verified for correct cryptographic signatures, or the system refuses to boot. This is a desirable security feature, because it protects from malware sneaking into the boot process. However, it has an issue for alternative operating systems, because it's likely they won't have a signature that Secure Boot will authorize. No worries, because Microsoft also mandated that every system must have a UEFI configuration setting to turn the protection off, allowing booting other operating systems. This situation may now change. At its WinHEC hardware conference in Shenzhen, China, Microsoft said the setting to allow Secure Boot to be turned off will become optional when Windows 10 arrives. Hardware can be "Designed for Windows 10," and offer no way to opt out of the Secure Boot lock down. The choice to provide the setting (or not) will be up to the original equipment manufacturer.

HughPickens.com writes CNN reports that when asked how to offset the influence of big money in politics, President Barack Obama suggested it's time to make voting a requirement. "Other countries have mandatory voting," said Obama "It would be transformative if everybody voted — that would counteract money more than anything," he said, adding it was the first time he had shared the idea publicly. "The people who tend not to vote are young, they're lower income, they're skewed more heavily towards immigrant groups and minority groups. There's a reason why some folks try to keep them away from the polls." At least 26 countries have compulsory voting, according to the Institute for Democracy and Electoral Assistance. Failure to vote is punishable by a fine in countries such as Australia and Belgium; if you fail to pay your fine in Belgium, you could go to prison. Less than 37% of eligible voters actually voted in the 2014 midterm elections, according to The Pew Charitable Trusts. That means about 144 million Americans — more than the population of Russia — skipped out. Critics of mandatory voting have questioned the practicality of passing and enforcing such a requirement; others say that freedom also means the freedom not to do something.

jones_supa writes Microsoft has issued a warning that a fraudulent SSL digital certificate has been issued in the name of a Finnish version of its Windows Live service. Although the company says it has revoked the certificate, security experts warn that older software may continue to "trust" the known bad certificate for months or even years, and that attackers could use it to trick users into running malware. "Microsoft is aware of an improperly issued SSL certificate for the domain 'live.fi' that could be used in attempts to spoof content, perform phishing attacks or perform man-in-the-middle attacks," Microsoft says in a March 16 security alert. "It cannot be used to issue other certificates, impersonate other domains or sign code. This issue affects all supported releases of Microsoft Windows. Microsoft is not currently aware of attacks related to this issue."

itwbennett writes Twitter is ramping up its efforts to combat harassment with a tool to help users report abusive content to law enforcement. The reports would include the flagged tweet and its URL, the time at which it was sent, the user name and account URL of the person who posted it, as well as a link to Twitter's guidelines on how authorities can request non-public user account information from Twitter. It is left up to the user to forward the report to law enforcement and left up to law enforcement to request the user information from Twitter.

tsu doh nimh writes: The Evolution Market, an online black market that sells everything contraband — from marijuana, heroin and ecstasy to stolen identities and malicious hacking services — appears to have vanished in the last 24 hours with little warning. Much to the chagrin of countless merchants hawking their wares in the underground market, the curators of the project have reportedly absconded with the community's bitcoins — a stash that some Evolution merchants reckon is worth more than USD $12 million.

PvtVoid writes with this report from the New York Times, excerpting: An industry consultant, Cherian Abraham, put the fraud rate [for Apple Pay] at 6 percent, compared with a traditional credit card fraud rate that is relatively minuscule, 10 cents for every $100 spent. [i.e. one tenth of one percent]. The vulnerability in Apple Pay is in the way that it — and card issuers — "onboard" new credit cards into the system. Because Apple wanted its system to have the simplicity for which it has become famous and wanted to make the sign-up process "frictionless," the company required little beyond basic credit card information about a user. Nor did it provide much information to the banks, like full phone numbers and addresses, that might help them detect fraud early. The banks, desperate to become their customers' default card on Apple Pay — most add only one to their iPhones — did little to build their own defenses or to push Apple to provide more detailed information about its customers. Some bank executives acknowledged that they were were so scared of Apple that they didn't speak up.

HughPickens.com writes Joe Pinsker writes at The Atlantic that Finish businessman Reima Kuisla was recently caught going 65 miles per hour in a 50 zone in his home country and ended up paying a fine of $56,000. The fine was so extreme because in Finland, some traffic fines, as well as fines for shoplifting and violating securities-exchange laws, are assessed based on earnings—and Kuisla's declared income was €6.5 million per year. Several years ago another executive was fined the equivalent of $103,000 for going 45 in a 30 zone on his motorcycle. Finland's system for calculating fines is relatively simple: It starts with an estimate of the amount of spending money a Finn has for one day, and then divides that by two—the resulting number is considered a reasonable amount of spending money to deprive the offender of. Then, based on the severity of the crime, the system has rules for how many days the offender must go without that money. Going about 15 mph over the speed limit gets you a multiplier of 12 days, and going 25 mph over carries a 22-day multiplier. Sweden, Denmark, Germany, Austria, France, and Switzerland also have some sliding-scale fines, or "day-fines," in place, but in America, flat-rate fines are the norm. Since the late 80s, when day-fines were first seriously tested in the U.S., they have remained unusual and even exotic.

Should such a system be used in the United States? After all, wealthier people have been shown to drive more recklessly than those who make less money. For example Steve Jobs was known to park in handicapped spots and drive around without license plates. But more importantly, day-fines could introduce some fairness to a legal system that many have convincingly shown to be biased against the poor. Last week, the Department of Justice released a comprehensive report on how fines have been doled out in Ferguson, Missouri. "Ferguson's law enforcement practices are shaped by the City's focus on revenue rather than by public safety needs," it concluded. The first day-fine ever in the U.S. was given in 1988, and about 70 percent of Staten Island's fines in the following year were day-fines. A similar program was started in Milwaukee, and a few other cities implemented the day-fine idea and according to Judith Greene, who founded Justice Strategies, a nonprofit research organization, all of these initiatives were effective in making the justice system fairer for poor people. "When considering a proportion of their income,people are at least constantly risk-averse. This means that the worst that would happen is that the deterrent effect of fines would be the same across wealth or income levels," says Casey Mulligan. "We should start small—say, only speeding tickets—and see what happens."

The driving force behind the creation and abandonment of execution methods is the constant search for a humane means of taking a human life. Arizona, for example, abandoned hangings after a noose accidentally decapitated a condemned woman in 1930. Execution is also prone to problems as witnesses routinely report that, when the switch is thrown, the condemned prisoner "cringes," "leaps," and "fights the straps with amazing strength." The hands turn red, then white, and the cords of the neck stand out like steel bands. The prisoner's limbs, fingers, toes, and face are severely contorted. The force of the electrical current is so powerful that the prisoner's eyeballs sometimes pop out and "rest on [his] cheeks." The physical effects of the deadly hydrogen cyanide in the gas chamber are coma, seizures and cardiac arrest but the time lag has previously proved a problem. According to Ford one reason lethal injection enjoyed such tremendous popularity was that it strongly resembled a medical procedure, thereby projecting our preconceived notions about modern medicine—its competence, its efficacy, and its reliability—onto the capital-punishment system. "As states revert to earlier methods of execution—techniques once abandoned as backward and flawed—they run the risk that the death penalty itself will be seen in the same terms."